#VU66549 Security restrictions bypass in Intel products - CVE-2022-26373

 

#VU66549 Security restrictions bypass in Intel products - CVE-2022-26373

Published: August 16, 2022


Vulnerability identifier: #VU66549
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-26373
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Intel Xeon E Processors
Intel Xeon D Processors
Intel Xeon W Processors
Intel Core X-series Processors
2nd Generation Intel Xeon Scalable Processors
3rd Generation Intel Xeon Scalable Processors
10th Generation Intel Core Processors
Intel Core Processors with Intel Hybrid Technology
11th Generation Intel Core Processors
Intel Xeon Processors
8th Generation Intel Core Processors
Intel Pentium Gold Processor Series
Intel Celeron Processor 5000 Series
12th Generation Intel Core Processors
Intel Celeron Processors
9th Generation Intel Core Processors
Software vendor:
Intel

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to non-transparent sharing of return predictor targets between contexts in Intel CPU processors. A local user can bypass the expected architecture isolation between contexts and gain access to sensitive information on the system.


Remediation

Install updates from vendor's website.

External links